Ericsson today announced it has completed a LTE network expansion for U.S. Cellular and its partner, King Street Wireless. The expansion was part of U.S. Cellular's third wave of LTE network rollouts and covers cities in five states including Madison, Wis.; Portland, Maine; Cedar Rapids, Iowa and markets in New Hampshire and North Carolina. As part of the latest expansion, Ericsson provided the LTE access network and expanded capacity to support U.S. Cellular's markets. This includes 4G LTE base stations (eNodeB's), using Ericsson's RBS 6000 multi-standard base station. Ericsson also provided network implementation services.

Inmarsat provider of global mobile satellite communications services, is expanding its M2M distribution channel through the appointment of RacoWireless as a global distribution partner for its IsatData Pro service.

Amdocs, provider of customer experience systems and services, today announced the availability of Amdocs TeraScale, a carrier-grade, big data solution designed to cost-efficiently store, manage and extract real-time charging usage data for analytical use cases. The new solution leverages big data storage technologies based on the Hadoop ecosystem, and enables deeper, more rapid real-time analytics through usage data modelling and embedded ETL (extract, transform and load) processes. Amdocs TeraScale is a new offering within the Amdocs CES 9.1 product suite.

Yota Devices, developer of high tech consumer LTE devices, and Cellrox, a leader in multi-persona solutions for mobile devices, announced today at Mobile World Congress a partnership agreement to provide Cellrox’s multi-persona technology on the dual-screen YotaPhone. With this technology, YotaPhone will provide functionality, privacy and security for both corporate and personal use.

Radware today announced a new holistic security architecture that combines distributed detection and mitigation elements called Attack Mitigation Network (AMN) -- a security solution that expands detection coverage across all enterprise resources and automates the mitigation by selecting the most effective tools and locations -- in the data center, at the perimeter or in the cloud.